Consulting News

Friday Squid Blogging: Giant Squid Genome Analyzed

This is fantastic work: In total, the researchers identified approximately 2.7 billion DNA base pairs, which is around 90 percent the size of the human genome. There’s nothing particularly special about that size, especially considering that the axolotl genome is 10 times larger than the human genome.

Don’t let imposters into your inbox

Phishing emails impersonating well-known brands and VIPs within an organization are a big problem for security teams to deal with. So, we’re excited to announce that you’ll now be able to detect and block these impersonation attacks with Sophos Email Advanced. Email impersonation phishing attacks in action

Behind the Broadcom-Accenture Deal of Cyber Security Services (CSS)

It is cliché to point out that business is all about change. But as we’ve seen over the years, the most successful companies are the ones that pivot in new directions to best meet the needs of their customers. Nowhere is that more true than in the cybersecurity

Behind the Broadcom-Accenture Deal of Cyber Security Services (CSS)

It is cliché to point out that business is all about change. But as we’ve seen over the years, the most successful companies are the ones that pivot in new directions to best meet the needs of their customers. Nowhere is that more true than in the cybersecurity

Symantec and Bay Dynamics: Two Tech Leaders Under One Roof

About the Author Ryan Stolte CTO, Information Security Group Ryan is focused on providing innovative solutions to identify and mitigate data breaches and insider threats as part of the Symantec Enterprise Division. He was the co-founder and CTO of Bay Dynamics, acquired by Broadcom.

Symantec and Bay Dynamics: Two Tech Leaders Under One Roof

About the Author Ryan Stolte CTO, Information Security Group Ryan is focused on providing innovative solutions to identify and mitigate data breaches and insider threats as part of the Symantec Enterprise Division. He was the co-founder and CTO of Bay Dynamics, acquired by Broadcom.

Symantec and Bay Dynamics: Two Tech Leaders Under One Roof

About the Author Ryan Stolte CTO, Information Security Group Ryan is focused on providing innovative solutions to identify and mitigate data breaches and insider threats as part of the Symantec Enterprise Division. He was the co-founder and CTO of Bay Dynamics, acquired by Broadcom.

The Truth About Email/Web Security

About the Author Matt Willden Product Manager: Network Threat Protection Matt is responsible for the threat detection products used in Symantec Enterprise Division’s network protection portfolio. Specifically, Intelligence Services, which provides URL intelligence for Symantec, as well as Content and Malware Analysis.

The Truth About Email/Web Security

About the Author Matt Willden Product Manager: Network Threat Protection Matt is responsible for the threat detection products used in Symantec Enterprise Division’s network protection portfolio. Specifically, Intelligence Services, which provides URL intelligence for Symantec, as well as Content and Malware Analysis.

The Truth About Email/Web Security

About the Author Matt Willden Product Manager: Network Threat Protection Matt is responsible for the threat detection products used in Symantec Enterprise Division’s network protection portfolio. Specifically, Intelligence Services, which provides URL intelligence for Symantec, as well as Content and Malware Analysis.

Securing Tiffany’s Move

Blog > Securing Tiffany’s Move Story of how Tiffany & Company moved all of its inventory from one store to another. Short summary: careful auditing and a lot of police. Tags: auditing, physical security, police Posted on January 16, 2020 at 10:01 AM • 9 Comments Comments Subscribe

Microsoft Patch Tuesday – January 2020

Cumulative Security Updates for Microsoft Windows Windows RDP Gateway Server Remote Code Execution Vulnerability (CVE-2020-0610) MS Rating: Critical A remote code execution vulnerability exists in the Windows Remote Desktop Protocol (RDP) Gateway Server when an unauthenticated attacker connects to the target system using RDP and sends specially

Applying threat intelligence to Iranian cyberattack risk

With geopolitical events changing daily, discussions and questions about threat intelligence and strategies for defending against possible cyberattacks from Iran are front and center. Security operations teams also face increased pressure to provide answers and reassurance to customers and their organization’s senior leadership that “yes, we’re covered.”

Critical Windows Vulnerability Discovered by NSA

Yesterday’s Microsoft Windows patches included a fix for a critical vulnerability in the system’s crypto library. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a

Compiling Open Source Threat Intelligence for Threat Hunts

In addition to normal tradecraft adaptations, any time a change in the geopolitical landscape takes place, cyberattack campaigns and adversary behaviors typically shift as well. The recent events with Iran and the United States offer a relevant use case for organizations and have highlighted the benefit of